config system global
Use this command to manage system settings.
Before you begin:
- You must have read-write permission for system settings.
Syntax
config system global
set admin-idle-timeout <integer>
set admin-lockout-duration <integer>
set admin-lockout-threshold <integer>
set advanced-bot-status {enable|disable}
set config-sync {enable|disable}
set default-certificate <certname>
set hardware-ssl {enable|disable}
set hostname <string>
set language {english|chinese-simplified}
set port-http <integer>
set port-https <integer>
set port-ssh <integer>
set port-telnet <integer>
set share-ip-address {enable|disable}
set snat-match-local-traffics {enable|disable}
set ipvs-fullnat-min-port <integer>
set ipvs-fullnat-max-port <integer>
set snat-min-port <integer>
set snat-max-port <integer>
set socket-min-port <integer>
set socket-max-port <integer>
set ssh-cbc-cipher {enable|disable}
set ssh-hmac-md5 {enable|disable}
set vdom-admin {enable|disable}
set vdom-mode {independent-network|share-network}
set admin-bypass-vdom-check {enable|disable}
set pre-login-banner {enable|disable}
set sync-slb-statistics {enable|disable}
set shell-access {enable|disable}
set shell-username <username>
set shell-password <password>
set shell-timeout <integer>
set threat-analytics {enable|disable}
set owasp-compliance {enable|disable}
end
admin-idle-timeout |
Log out an idle administrator session. The default is 30 minutes. |
admin-lockout-duration |
Amount of time in seconds that an administrator account is locked out after reaching the admin-lockout-threshold for repeated failed login attempts. The default is 60 seconds. The valid range is 1 to 2147483647 seconds. |
admin-lockout-threshold |
Number of failed login attempts before an administrator account is locked out for the admin-lockout-duration. The default is 3. The valid range is 1 to 10. It is recommended to keep the number of allowable attempts lower as increasing the number of retry attempts elevates the risk of unauthorized individuals successfully guessing the password. |
advanced-bot-status |
Enable/disable the Advanced Bot Protection Fabric Connector. Once enabled and successfully connected, the If you want to disable the Advanced Bot Protection connector, the following settings will be impacted:
For more information, see the Handbook topic about Advanced Bot Protection. |
config-sync |
Enable/disable the configuration synchronization feature. This feature is related to the execute config-sync command, not HA synchronization. Disabled by default. |
default-certificate |
The default is Factory. |
hardware-ssl |
Enable/disable hardware SSL acceleration. The setting has no effect on FortiADC-VM. |
hostname |
You can configure a hostname to facilitate system management. If you use SNMP, for example, the SNMP system name is derived from the configured hostname. The hostname can be up to 35 characters in length. It can include US-ASCII letters, numbers, hyphens, and underscores, but not spaces and special characters. The System Information widget and the |
language |
English or Simplified Chinese. |
port-http |
Specify the port for the HTTP service. Usually, HTTP uses port 80. |
port-https |
Specify the port for the HTTPS service. Usually, HTTPS uses port 443. |
port-ssh |
Specify the port for the SSH service. Usually, SSH uses port 22. |
port-telnet |
Specify the port for the Telnet service. Usually, Telnet uses port 25. |
share-ip-address |
Enable this option to share NAT IP pools/addresses between L4, L7 virtual servers, and SNAT policy. Once enabled, SNAT across the firewall, L4 VS and L7 VS can use the same IP address, but with different port ranges that can be customized. |
snat-match-local-traffics |
If share-ip-address is enabled, snat-match-local-traffics becomes configurable. Enable/disable the SNAT rule to match with the local traffic. |
ipvs-fullnat-min-port |
If share-ip-address is enabled, ipvs-fullnat-min-port becomes configurable. Specify the L4 VS FULLNAT port range minimum. |
ipvs-fullnat-max-port |
If share-ip-address is enabled, ipvs-fullnat-max-port becomes configurable. Specify the L4 VS FULLNAT port range maximum. |
snat-min-port |
If share-ip-address is enabled, snat-min-port becomes configurable. Specify the SNAT port range minimum. |
snat-max-port |
If share-ip-address is enabled, snat-max-port becomes configurable. Specify the SNAT port rang maximum. |
socket-min-port |
If share-ip-address is enabled, socket-min-port becomes configurable. Specify the L7 VS port range minimum. |
socket-max-port |
If share-ip-address is enabled, socket-max-port becomes configurable. Specify the L7 VS port range maximum. |
ssh-cbc-cipher |
Disabled by default. Enable if you want to use this cipher. |
ssh-hmac-md5 |
Disabled by default. Enable if you want to use this cipher. |
vdom-admin |
Enables the virtual domain feature. |
vdom-mode |
The vdom-mode option becomes available if vdom-admin is enabled. Select either of the following virtual domain modes:
|
admin-bypass-vdom-check |
The admin-bypass-vdom-check option is available if vdom-admin is enabled and the vdom-mode is independent-network. Once enabled, all non-root VDOM administrators can login through the root VDOM interface without needing root VDOM privileges. From the root VDOM interface, the non-root VDOM administrator can access and modify the settings relating to their designated non-root VDOM. This is disabled by default. |
pre-login-banner |
Enables the pre-login banner feature. |
sync-slb-statistics |
Enable/disable the statistic data between the SLB and GLB. |
shell-access |
Enable/disable the shell access. This is disabled by default. |
shell-username |
Specify the username to login to the shell. |
shell-password |
Specify the password to access the shell. |
shell-timeout |
The expire time, in minutes, after the shell access is enabled. (Range: 1-1200 minutes). |
threat-analytics |
Enable/disable the Threat Analytics connector. If you do not already have a license for the Fortinet AI Threat Analytic service, FortiADC offers a 14-day Evaluation license to evaluate the Fortinet AI Threat Analytics service. During this 14-day trial period, you can disable and re-enable AI Threat Analytics anytime. The 14-day trial period starts from the first time AI Threat Analytics is enabled. For more information about the AI Threat Analytics integration with FortiADC, see the FortiADC Handbook topic on AI Threat Analytics. |
owasp-compliance |
Enable OWASP Top10 Compliance to view the security compliance rate for each SLB virtual server in FortiView. This is disabled by default. |
Example
FortiADC-VM # get system global default-certificate : Factory hostname : FortiADC-VM vdom-admin : disable admin-idle-timeout : 480 admin-lockout-duration : 60 admin-lockout-threshold : 3 port-http : 80 port-https : 443 port-ssh : 22 port-telnet : 23 share-ip-address : enable snat-match-local-traffics : enable ipvs-fullnat-min-port : 5000 ipvs-fullnat-max-port : 21846 snat-min-port : 21847 snat-max-port : 43690 socket-min-port : 43691 socket-max-port : 65535 language : english hardware-ssl : enable gui-system : enable gui-router : enable gui-log : enable ssh-cbc-cipher : disable ssh-hmac-md5 : disable config-sync-enable : disable pre-login-banner : enable sync-slb-statistics : enable shell-access : enable shell-username : user shell-password : 123456 shell-expire-time : 10 threat-analytics : enable owasp-compliance : enable